HI BRO'S
I've returned after a few time because I want to explain to all people who doesn't know about :
Risk of social network
Habits of efective network security
Propietary software vs free software
Types of software licence
Let's start .
RISK OF SOCIAL NETWORK
Most of people think tha social network is always secure but If you read this you will change a bit your opinion. Social networking sites allow someone to post information that thousands of other users can read. But that's not at all. In this Q&A, information security threats expert Ed Skoudis reveals how sites like Myspace and Youtube let the bad guys post something more dangerous: malware.
I'm going to tell you some examples of this :
Fraud and thef:
Posting too much personal information in your social networking profile could result in identity theft, financial fraud and monetary losses.
You should consider whatever you post as being accessible to the entire world.If you would not put it on a public bulletin board, then do not post it online. Even if you delete your profile, it can still remain on the Internet.
As in any type of fraud, fraudsters will go after the easiest victims first.
They will target social networking accounts that are not using the security features available on the site, in the Internet browser or in security and anti-virus software.
The easiest way for fraudsters to get access to your information is to send you a “friend request” or something similar. Many people assume that only people who know you or have contacts in common would send you a request, and accept it without questioning. You should never accept a friend request if you do not know the person sending it or would not be comfortable with that person having access to your personal information and photos.
Once fraudsters have access to or control of your profile, they can use this information for identity theft.
They can also try to use your account to commit other types of fraud, like telling people you are in trouble and asking them to send money to help you out.
Fraudsters are trying to get their hands on any information they can find out about you. Your personal details may not be harmful on their own, but once they are combined, you can be at a higher risk for fraud.
Loss of privacy:
One of the issues that stems from the use of social media these days is the loss of privacy. People often post things without a filter or any thought of who might read their post.
The issue of privacy within the social media community has become a hot topic among users over the past several years. The lack of the ability to post on these websites without it being seen by anybody and everybody has created a system of wide open public intrusion. To further the problems with this lack of privacy is the naive nature that teen users show with their over sharing on these websites. Social media and internet giants mass data storage of these websites without user consent and the availability of it for third party users shows that these websites have violated user privacy. This is a big issue that needs to be addressed and needs to be considered when posting on these websites. In the mean time, be careful how much you chose to share on these sites because you never know who will see it.
Acces to unsuitable contents:
It’s possible that children may come across things online which are inappropriate for their age and stage of development. You can use filters to block this content and prepare your child by showing them the best ways to avoid it.

Habits
of children will go online to watch video clips

Awareness
of parents say age-inappropriate content is their top concern

Concerns
of teens believe that accessing inappropriate content online accidentally is an issue
Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.
Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles
HABITS OF EFECTIVE NETWORK SECURITY
3 Secret Habits of Really Effective Network Security Programs:
- Make Sure there is Cooperation Between the Network, Security and Application Teams:Siloing the various teams in your department can stifle your security activities, and keep you from reaching your goals. Network operations staff, the security staff and the application teams should all be communicating fluidly, with 100% of top-tier organizations in the survey citing this as a best practice.
Utilize DNS/DHCP Data to it’s Full Potential:This is a slowly growing but serious differentiator between effective and mediocre security departments. According to the survey, close to half of top-tier organizations use DNS/DHCP data to discover other new devices, compared to zero other contenders.
Commit to the Continual Use of Intelligence:The most successful organizations have a mechanism in place that forces them to commit to security intelligence. They’re 6x as likely to have deployed an SIEM, and 4x as likely to invest in machine-readable threat intelligence.
The term open source refers to software whose source code — the medium in which programmers create and modify software — is freely available on the Internet; by contrast, the source code for proprietary commercial software is usually a closely guarded secret.
The most well-known example of open source software is the Linux operating system, but there are open source software products available for every conceivable purpose.
Open source software is distributed under a variety of licensing terms, but almost all have two things in common: the software can be used without paying a license fee, and anyone can modify the software to add capabilities not envisaged by its originators.
A standard is a technology specification whose details are made widely available, allowing many companies to create products that will work interchangeably and be compatible with each other. Any modern technology product relies on thousands of standards in its design — even the gasoline you put in your car is blended to meet several highly-detailed specifications that the car’s designers rely on.
For a standard to be considered an open standard, the specification and rights to implement it must be freely available to anyone without signing non-disclosure agreements or paying royalties. The best example of open standards at work is the Internet — virtually all of the technology specifications it depends on are open, as is the process for defining new ones.
An Application Programming Interface (API) is a feature of a software application that allows other software to inter-operate with it, automatically invoking its functionality and exchanging data with it. The definition of an API is a form of technology standard. The term open API doesn’t yet have a universally accepted definition, but it’s generally expected to be “open” in the same manner as an open standard.
The common theme of “openness” in the above definitions is the ability of diverse parties to create technology that interoperates. When evaluating your organization’s current and anticipated software needs, consider a solution’s capability to interoperate as an important criterion. To extend the value of your technology investment, select a software solution that is based on open standards and APIs that facilitate interoperability and has the capability for direct integration between various vendors’ products.
TYPE OF SOFTWARE LICENSES
- Individual: License type for single installation
- OEM (Original Equipment Manufacturers): License type for software that is already installed in the hardware.
- Named User License: License Type for a specific user.
- Volume: License Type supporting multiple users.
- Client Access License (CAL): License type that gives a user the rights to access the services of the server.
- Trial License: License Type for trial versions of software.
- Enterprise (Perpetual): License Type that does not require renewal and is for life long.
- Concurrent License: License Type for software that can be accessed by a specific number of users at a time.
- Free License: License Type for freeware software.
- Enterprise Subscription: License Type that requires renewal for every specific period.
- Node Locked: License Type for workstations with specific configurations.
https://www.smseagle.eu/2016/06/01/3-secret-habits-of-really-effective-network-security-programs/
https://www.manageengine.com/products/service-desk/help/adminguide/configurations/software/software-license-type.html
https://opensource.com/resources/what-open-source
https://www.stopbullying.gov/cyberbullying/what-is-it/
https://www.internetmatters.org/issues/inappropriate-content/